US20140325625A1 - Cyber gene identification technology based on entity features in cyber space - Google Patents

Cyber gene identification technology based on entity features in cyber space Download PDF

Info

Publication number
US20140325625A1
US20140325625A1 US14/326,164 US201414326164A US2014325625A1 US 20140325625 A1 US20140325625 A1 US 20140325625A1 US 201414326164 A US201414326164 A US 201414326164A US 2014325625 A1 US2014325625 A1 US 2014325625A1
Authority
US
United States
Prior art keywords
cyber
parameters
matrix
information
entity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/326,164
Other versions
US9253181B2 (en
Inventor
Nanjie Liu
Jun Sun
Haitao Zhao
Chengjie Gu
Dapeng Li
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Digital Dna Technology Co ltd
Original Assignee
Nanjie Liu
Jun Sun
Haitao Zhao
Chengjie Gu
Dapeng Li
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjie Liu, Jun Sun, Haitao Zhao, Chengjie Gu, Dapeng Li filed Critical Nanjie Liu
Priority to US14/326,164 priority Critical patent/US9253181B2/en
Publication of US20140325625A1 publication Critical patent/US20140325625A1/en
Priority to US14/959,372 priority patent/US9635016B2/en
Application granted granted Critical
Publication of US9253181B2 publication Critical patent/US9253181B2/en
Assigned to JIANGSU DIGITAL DNA TECHNOLOGY CO.,LTD reassignment JIANGSU DIGITAL DNA TECHNOLOGY CO.,LTD ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GU, CHENGJIE, LI, DAPENG, LIU, NANJIE, SUN, JUN, ZHAO, HAITAO
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/303Terminal profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/30Types of network names
    • H04L2101/365Application layer names, e.g. buddy names, unstructured names chosen by a user or home appliance name

Definitions

  • the present invention relates to a new identification technology that achieves unified and standardized object identification within Cyber Space.
  • This technology achieves those mentioned above by extracting intrinsic information from either the physical user or their cyberspace counterpart. Such information is categorized into client parameters, dynamic parameters, static parameters, cloud parameters, connection parameters and user parameters.
  • This ID (identification) technology is based upon intrinsic properties of the entity to be identified, and we will call this Cyber Gene ID (or Cyber ID).
  • a person can achieve one to one projection of objects within the Physical Space and objects within the Cyber Space.
  • Such projection will also be two way and can be used to solve current core IT (information technology) issues such as Trusted ID, information security, network security, network credibility, privacy protection, etc.
  • CPS Cyber Physical Systems
  • IP internet protocol
  • RFID radio frequency identifier
  • URL Uniform Resource Locator
  • the present invention discloses a method of recognizing cyber space objects by using the natural properties of a cyber-entity (a logical entity that exists independently, and has user properties and information consumption/production properties). It has the universal and natural ability to uniquely identify a user, with functions similar to the biological gene, thus being called “cyber gene”.
  • the PC personal computer
  • based IP address can't uniquely identify a cell phone, but cell phones will be taking the roles of mobile computers in the future.
  • Standards such as E163 and E164 can't uniquely identify a car (In the future, vehicles with computing powers will also be part of the cyber physical space).
  • RFID radio frequency identifier/identification
  • GID Global Identification
  • IMEI International Mobile Equipment Identity
  • SIM Subscriber Identity Module
  • the present invention discovers a structural data relationship that distinguishes one cyberspace entity from other entities. Furthermore, the ID data set and structural data relations are used as the “digital DNA” or “cyber DNA” of the cyber entity. Through this method, we find that there are no two identical cyber entities, even if they were of the similar type of client, PC, automobile and electronic devices manufactured by the same manufacturer. This is the cyber gene principle as mentioned in the present invention.
  • Cyber entity a logical entity that has independent purposes and management properties in the cyber space such as a set of data, network element, client, user profile or the combination thereof.
  • Protocol stack individuals of various protocol stacks, protocol stack sequences and protocol stack sequence sets according ISO/OSI (International Organization for Standardization/Open Systems Interconnection model) system structure, and the permutation and combination thereof.
  • the protocol stack also includes various protocol parameters and key data (such as facilities) inside all protocol stacks, and parameters for describing the protocol functions which comprise:
  • Cyber ID abbreviation of identification generated according to the cyber gene principles.
  • IP Internet protocol
  • ⁇ right arrow over (I) ⁇ 1 an space-time independent array of data that belongs to the static parameters of the user or cyber entity.
  • ⁇ right arrow over (I) ⁇ 2 an space-time dependent array of data that belongs to the dynamic parameters of the user or cyber entity.
  • ⁇ right arrow over (I) ⁇ 3 an array of data that reflects the cyber behaviors features of the user or cyber entity.
  • ⁇ right arrow over (C) ⁇ 1 a client parameter array at the client side in CS that is related to user or cyber entity.
  • ⁇ right arrow over (C) ⁇ 2 a connection parameter array at the network side in CS that is related to the user or cyber entity. For example, information on the parameters that describes the entity uniqueness in a protocol stack regarding the features of the user or cyber entity.
  • ⁇ right arrow over (C) ⁇ 3 a cloud parameter array at the cloud side in CS that is related to the user or cyber entity.
  • F DNA a multi-dimensional matrix that constitutes the cyber structural ID, or the function value of cyber ID (Cyber ID).
  • This “structural ID” includes feature elements of the client, connection and cloud protocol stack sequence and some information relations expressed according to the 3 ⁇ 3 parameter matrix constructed up by dynamic and static parameter segmentations related to the user.
  • the framework is a complete set because from the perspective of information communication, any cyber space activity can be described as some kind of combination and permutation of a few clients, connections and cloud protocol stacks. They may be divided into three categories that are related to the user regardless of whether they are independent or dependent on time. They are the client, connection and cloud protocol stack horizontally and Layer 1 ⁇ 7+Layer 8 (Application & Service) longitudinally. The information of all cyber entities falls within this scope, and the feature data in C 3 track of any cyber entity are all covered.
  • the metadata that are constructed by these randomly selected ID data sets form a novel, natural multi-dimensional code block and a multi-dimensional matrix that can express the unique identity features of an entity, which is a “cyber DNA” structure, i.e. cyber ID.
  • the present invention objectively generates a unique structural identification relationship that may represent an entity according to the principle of “six degrees of segmentation” and reasonable division of the dynamic, static and user feature data structures from the “client, connection and cloud” protocol stack.
  • the structural multi-tuple relationship is similar to the multi-dimensional code, and the difference is that its metadata are all from the entity. At the same time, these metadata and their relations are all natural and objective, which are not artificially defined, hence their inherent standardization.
  • the information communication (or behavior track) process and scope of any cyber entity in cyber space can only fall within the scope of C 3 and its combination.
  • the multi-tuple data extracted or sampled from the dynamic and static parameters at different time and different dimensions are natural and objective.
  • its “function value” is verified to be static and the gene functions or gene-tuple formed based on these natural parameters constitute the objective cyber ID.
  • the cyber ID based on the user's objective element information is constructed by means of the known and intrinsic data and implicit data relations, which is vividly compared to cyber digital DNA. It realizes the objectiveness, trustworthiness, uniqueness, security, completeness and privacy functions of the user and cyber entity in the cyber space.
  • Cyber ID The overall technology of Cyber ID is divided into generation and recognition processes.
  • FIG. 1 discloses a flow diagram of cyber ID information extraction and ID sequence generation.
  • FIG. 2 is a multidimensional matrix corresponding to the cyber space formed from the mapping relation.
  • FIG. 1 gives a flow diagram of cyber ID information extraction and ID sequence generation.
  • Cyber ID is subject to the structure of ID function and multidimensional matrix.
  • ID sequence is formed from a 3 ⁇ 3 parameter matrix (step 104 ) constructed by user parameters, dynamic parameters, static parameters, client parameters, connection parameters and cloud parameters (step 102 ) via pre-defined mapping rules.
  • the structural logic information of cyber ID is derived from the actual data relation of five types of properties of entities inside the cyber space, i.e. “connection property, cloud property, behavior property, content property and security property”.
  • the array of static parameters that define personal features of a human being or an object does not change with time and space. For example, take the car as the user.
  • the static parameters include VIN (vehicle identification number), engine number, sales manufacturer, sales initial mileage, etc.
  • the static information parameters include the SSN (social security number), ID information, social relations information, PIM (personal information management), CV (curriculum vitae), etc.
  • the array of dynamic parameters that define the user and does changes with time or space is, for example, ⁇ name, password ⁇ pair, personal information (PI), cyber access point, access conditions, etc.
  • the array of user parameters defining the behavioral characteristics of the user is, for example, network footprint, spending habit, position trace, etc.
  • Array is defined by client parameters from the system and client level related to the user. For example, the address book in the client, software and hardware configuration information of the client, widget folder, etc, that indicate which kind is the object or the user, etc.
  • Array is defined by connection parameters from the network level, including network access type, address-like information, network facilities (which can extract a great deal of unique information from the protocol stack), DPI (deep package inspect), communication strategy, position, service facilities, roaming mechanism, etc.
  • Array is further defined by cloud parameters from the service level, indicating type of user service, QOE (Quality of Experience), security level, application environment, etc.
  • this matrix is a 3 ⁇ 3 type multidimensional matrix.
  • the vectors of user parameter, dynamic parameter and static parameter are the columns and the vectors of client parameters, connection parameters and cloud parameters are the rows.
  • Client is also divided into user, dynamic and static parts.
  • Connection is also divided into user, dynamic and static network parameters.
  • Cloud also consists of user features, dynamic and static parameters of service level.
  • the parameter value of each dimensionality may be Boolean value, data set, data structure, relation and the said combination, etc.
  • the 3 ⁇ 3 matrix formed by the value and relations of the elements on each vector will be stored in the cloud server (step 108 ) of service client, with or without conversion.
  • Any cyber entity may upload its dynamic parameters to the cloud server through real time online function to modify the corresponding parameters in the multidimensional matrix in a real time manner.
  • the structure of cyber ID may also change with the parameters in the matrix.
  • the user parameters, dynamic parameters, static parameters, client parameters, connection parameters and cloud parameters are all derived from the expression of a physical entity or logical entity in cyber space (such as the whole stack sequence in accordance with ISO/OSI protocol stack), they are an objective mapping of the physical entity or logical entity in the cyber world.
  • a physical entity or logical entity in cyber space such as the whole stack sequence in accordance with ISO/OSI protocol stack
  • they are an objective mapping of the physical entity or logical entity in the cyber world.
  • 3 ⁇ 3 parameter matrix there are many inherent, intrinsic and distinctive connections among and within data in the nine cells of the matrix. It is in these connections that a stable relation is formed gradually. We can gather these intrinsic relations among data and then apply the six degrees of segmentation principle and small world theory to form a unique data structure with certain values.
  • Those values are then mapped to cyber space (step 104 to step 108 ), so the one to one projection and binding relation of the physical world and the cyber world are achieved. Consequently, attributes of cyber ID, such as objectiveness, uniqueness, security, feasibility and completeness are established.
  • FIG. 2 is a multidimensional matrix that is corresponding to the cyber space formed from the mapping relation randomly sampled by a third entity. By comparing it with the multidimensional matrix of cyber ID formed from the 3 ⁇ 3 parameter matrix, unique ID recognition can be achieved.
  • Any users ( 202 ) in the physical world can acquire and upload its parameter information such as user parameters, dynamic parameters, static parameters, client parameters, connection parameters and cloud parameters to the cloud server according to ID forming process (step 204 ).
  • the cloud server takes samples of the uploaded data according to the application needs (fraud proof, anti-theft, authentication and charge, etc.) (step 208 ) by forming a list of all parameters (step 210 ). Rebuilding a multidimensional sub-matrix according to the data in the list and this sub-matrix is a certain sub-matrix of multidimensional matrix forming the cyber ID, which may be “sparse matrix” after sampling (step 212 ).
  • step 216 Comparing the sampled sub-matrix with the multidimensional matrix formed through the Cyber ID forming process to achieve verification (step 216 ). If the sampled sub-matrix is coincident with a certain part of the multidimensional matrix formed through the generation process and stored in the cloud sever, i.e. the data and data structure in the multidimensional matrix or the relation among data matches, then matching ID will be the output (step 218 ). Thus, unique ID recognition process is finished. During the whole process, the data collected is complete, which can reflect the features and characters of all aspects of entity.
  • the cyber ID technology disclosed by the present invention impacts identification procedure for elements in the cyber systems such as equipment, standards, the processing, transportation, management and control of information.
  • the technologies covered include from simple technologies to advanced technologies and from cyber entity, client, connection and cloud, regardless if it is in a dynamic environment or static environment.
  • the object of the present identification and recognition technology has the features of both CS and PS owners and has unique mapping of real name and anonymity in CS and PS, thus it is global cyber digital gene identification system in CS and informational PS.
  • the present invention solves the problem of cyber entity trusted ID recognition in the field of cyber and physical system (CPS), IOT (internet of things).
  • CPS physical space
  • CS cyber space
  • real name and real name, real name and fake name, fake name and real name, fake name and fake name can be achieved by using this method. It is possible to comprehensively describe the property of each cyber entity in an objective manner in CS.
  • the network efficiency and some online functions may be enhanced greatly, thus forming the core foundation of all kinds of solutions in the application of next generation CPS and Internet of Things.
  • the cyber ID abstracted by using the structural information of cyber personalized entity in the client, connection and cloud system shares the features with biological genes. First of all, it is objective and unique. Then it is safe, has privacy protection and is intelligent. It can be used as a unique technical method to identify any entity in cyber space, and to solve the current inseparable problem of address and identification and many problems that are common in communication, which were difficult to settle before, such as ID, privacy protection, information security, good faith transaction, border invasion and cyber fraud.
  • the present invention provides a technology for achieving the consistent and unique identification and authentication of cyber and physical space entities by extracting various physical or virtual, user's intrinsic and objective property information (user parameter, dynamic parameter, static parameter, client parameter, connection parameter and cloud parameter) from the cyber world in cyber space (CS), and a genetic digital ID (cyber ID) method based on the 3 ⁇ 3 parameter matrix in cyber space.
  • the method consists of the acquisition of cyber entity structure information, generation process of cyber ID as well as the analysis, validation and identification processes of cyber ID. Anything that is in accordance with the above principle and business process and takes the following methods or thoughts belongs to the scope of this patent.
  • a method is disclosed to create a trusted and unique identity for a network entity from its intrinsic properties.
  • the properties are based on the network entity's client, connection and cloud protocol stacks.
  • the static and dynamic properties and the combination order of those protocol stacks make up the system the trusted identity is based upon.
  • Cyber ID is determined by the relational structure amongst the multi-dimensional ID matrix elements.
  • the ID sequence and matrix elements are generated by the 3 ⁇ 3 grid matrix that is built by user parameters, dynamic parameters, static parameters, client parameters, connection parameters and cloud parameters in accordance with specific mapping rules.
  • the structural information of cyber ID originates from the data relations of five properties of “cyber property, service property, behavioral property, content property and security property” on the intrinsic and inherent service of the entity in cyber space.
  • the array that defines the individual characteristics of the user or logic object and doesn't vary with time and space on the static parameter dimension is, for example, the automobile acts as the inherent parameter, including VIN, engine No., sales of manufacturers, initial mileage of sales and so on; the people act as the inherent information parameter, including user ID information, social relation information, resume and so on; cyber information parameter include the cyber type, DPI, cyber Facilities used in communication, IP address, roaming property and so on.
  • the array that defines the user on dynamic parameter dimension is, for example, (user name, command) pair, password, service cyber facilities (such as Proxy, Email) and so on.
  • the array that defines and reflects the users' behavioral characteristics on the user parameter dimension is, for example, consumption behavior, action path, cyber addiction, etc.
  • the client property information indicates that the user belongs to which scope of objects or which kind of users. It is required to define the connection parameter array from the cyber layer, including the cyber type, access facility, position and other cyber information. It is also required to define the cloud parameter array from the service layer to indicate the type of user service and service demand, etc. All these system property parameters contain the information in all aspects of the network. The transmission application and the information is objective.
  • the multi-dimensional matrix in the form of a 3 ⁇ 3 grid that is created based on these objective information, its rows consists of three dimensional vectors of user parameters, dynamic parameters and static parameters, and columns consists of three dimensional vectors of client parameters, connection parameters and cloud parameters.
  • the parameter of each dimension contains various elements that describe the parameter and relationships among elements and relational structure. In such cases, even some of the metadata changes, the relational structure will not. Therefore, it is a composite data entity that contains a large amount of inherent information and self-characteristics. According to the characteristics of different clients and/or users, the value of element in each scope can be real values (indicated by Boolean, relation, collection, array, data or arbitral data) or “null value”.
  • the multi-dimensional arrays formed in such ways will be stored in the cloud server of the service end through the encryption and exchange.
  • the client or user may upload his/her own dynamic parameter to the cloud server in real time online to change and synchronize the parameter in the multi-dimensional array in real time.
  • the change of dynamic information will not affect its original data structure, and thus, the digital signature will not be changed.
  • the “digital DNA” will be changed gradually.
  • any user in the physical world can upload their own key parameter information in the 3 ⁇ 3 parameter matrix to the cloud server in real time.
  • the information is sufficient and the cloud server handles user parameters, dynamic parameters, static parameters, client parameters, connection parameters and cloud parameters in all dimensions for the uploaded data based on the demands of application (anti-counterfeiting, encryption, authentication, financial transactions, etc.), forming a list of all attributes and restoring all property relationships. And then it is required to rebuild part of the multi-dimensional sub-matrix based on the list.
  • the sub-matrix is one sub-matrix of the multi-dimensional matrix that forms the cyber ID and it can be of sparse type.
  • sampling sub-matrix formed with the multi-dimensional matrix that is formed in the entire 3 ⁇ 3 parameter matrix and stored in the cloud server focusing on the structural data relation under the principles of six degrees of segmentation and Scale Free Rules. It is determined through the comparison that, if the sampling sub-matrix fits with the ID array that is formed through the 3 ⁇ 3 parameter matrix and stored in the cloud server in FIG. 1 on enough (sufficient and necessary) key structural information, that is, the data in multi-dimensional matrix, data structure or the relation among data fits, then the output result of determination is that the identity is either matched, or the identity isn't matched. In this way, the unique identity recognition process is completed. The entire process requires that the information collected is sufficient and can reflect the features and characteristics of the entity in all aspects with high fidelity.
  • the user parameters, dynamic parameters, static parameters, client parameters, connection parameters and cloud parameters that form the cyber ID contain necessary information that can embody and describe the cyber entity on the network path and the information are used in the basic communication, PIM (Personal Information Manager), communication facility, resource service facility, dynamic cache (dynamic data) and service platforms.
  • PIM Personal Information Manager
  • these information parameters are objective.
  • the arrays and data that are constituted by these objective and natural information are also objective.
  • the parameters that come from the cyber consensus or defaulted parameters that are composed of user network mode, VPN (virtual private network) and QOS (quality of service), access information and position information are also parameters existed rather than artificially defined subjective parameters.
  • the cyber ID that is constituted through the exchange has a stable and sole ability of representing the user properties.
  • the arrays that are composed of these parameters have the orthogonal property and are sole and objective and they are also unique. All property elements contained in the cyber ID structure are mappings from the physical information space without any artificial intervention. Therefore, the cyber ID is objective.
  • the client, connection and cloud (C 3 ) parameters objectively exist in the protocol stack during the information communication process, and they are also the combinations of all the information communication behaviors.
  • the information communication process and scope of any cyber entity in the cyber space can only be within the scope of C 3 and its assembly.
  • the metadata that is extracted at different time from different parameters or built by sampling is also natural and objective.
  • As for the specified cyber entity its “functional value” (data and its structural relation in array) is verified as unchangeable.
  • the objective cyber ID is composed of these genetic variables and natural parameters.
  • Cyber ID can be regarded as a combination of intrinsic and objective properties of an information entity. Mathematically, it is a function integrating various metadata and features, metadata combination, combinational relationships, data structure properties and key properties of different time stamps and space stamps of a silicon-based organism (the general term of various electronic chip devices with intelligent control mechanism). Information of all these functions is derived from the organism's natural existence. The structural relations of data are unique (because the multi-dimensional identification is adopted and the principle of six degrees of segmentation is abided by), therefore, no two entities are identical. The uniqueness also enhances the anti-interference capacity of ID system, since false positive verification will not occur due to matching properties on single criteria.
  • the security of cyber ID is determined by unique ID functions and matrix transformations. Due to the uniqueness of cyber ID, it is impossible to speculate different 6-degree relation sequences, and it is also uncertain to choose which six degrees. They have different time and space stamps.
  • the combinational elements here are the “client, connection and cloud” protocol stack, and all metadata of the cyber entity are derived from C 3 . But the complexity of determining the quantity and order of metadata and the randomness of selecting 6 from N exceeds even 256-bit RSA encryption.
  • the cyber ID sequence can only obtain the same transformation matrix in the target user under the condition that it has the information on the user's own verified and matched cyber ID. For non-target user or business, such ID can't be identified, and it is unknown and unavailable. Therefore, forced authorization is impossible.
  • the cyber ID-based encryption is safe for both the users and businesses, and it guarantees the security of information communication and exchange.
  • the cyber ID has the unique and objective features similar to biological DNA, and different clients and businesses have different ID sequence structures (structural relation features)—a gene code. Only the users or businesses that have their own gene code can have an access to the cyber resources, which are unknown and unavailable to the outside world and can't be separated from the entity. Just like no one can authorize their own biometric data for other people to use.
  • the uniqueness and security of the cyber gene can't be authorized, which is different from password or other forms. It can not be transferred, copied or plagiarized, thus having advantages in protecting the privacy, as what is said, “My information is in my hand”.
  • the information included in the cyber ID is self-information, and the recovery and verification of ID can only be obtained by users under the conditions of self-existence. It is not some known or defined multi-dimensional code. Based on such objective, portable and unique cyber ID, users can use their own information only when they are their true self. Only then are they allowed to proceed to use those information for application purposes.
  • the objectiveness, uniqueness, security and privacy of cyber ID are intertwined with each other.
  • Objectiveness is a basis for realizing the uniqueness feature, because the uniqueness of cyber ID depends on the objectiveness and natural standard of data collected from the physical world.
  • the objectiveness and uniqueness also determine the security of ID.
  • Cyber ID is obtained by extracting the information and metadata of the known C 3 protocol stack sequence.
  • a unique, multi-dimensional and objective information array can be constructed by means of the user's intrinsic basic communication information, PIM information, communication facility information, resource information, dynamic cache information and user behavior information.
  • the trustworthiness and reliability of Cyber ID are derived from previously mentioned objectiveness, uniqueness, security, privacy and accompanying and also from the non- mutability of the relational structure and objective data.
  • the user's cyber DNA can be rapidly obtained and then compared by means of the mathematical modeling, data mining and cluster analysis, mode identification, new internet technology and cloud computing technology. This process of generating and using cyber DNA is also a trustworthy technology.
  • the cyber gene ID is a subset of the information set of a cyber entity within the scope of C 3 (client, connection and cloud protocol stack) that covers the user information, dynamic information and static information of the user or cyber entity. Any trusted and self ID information and metadata must fall within such scope. Therefore, the expression of the 3 ⁇ 3 parameter matrix is sufficient.
  • any information involving the exchange and communication is certainly from the protocol stack of some entity, because the network space is consisted of a lot of protocol stacks and protocol stack sequences, with the information flows between and inside the protocol stacks.
  • the cyber gene model is a set of the abstract client, connection and cloud protocol stack. Therefore, it is a complete set, which is both necessary and sufficient.
  • the present invention comprises the following disclosures:
  • a Cyber Identification (ID) system that achieves fully secure, unique and consistent identification and authentication of entities within a Cyber-Physical Space (CPS), the aforementioned system comprising:
  • the aforementioned Cyber ID includes adoption of limited relational information and data structure that are implied in the invariable structure of inherent information of the aforementioned CPS entity as an entity identification, further comprising:
  • the aforementioned Cyber ID has a stable and sole ability of representing user properties, and the aforementioned arrays composed of the aforementioned parameters have an orthogonal property and are sole, objective and also unique.
  • the aforementioned property elements contained in the aforementioned Cyber ID structure are mappings from physical information space without any artificial intervention, and therefore the aforementioned Cyber ID is objective.
  • the aforementioned Cyber ID can be obtained by extracting the aforementioned information and the aforementioned metadata of the aforementioned C 3 protocol stack sequence.
  • the aforementioned Cyber ID can also be obtained and compared by means of mathematical modeling, data mining and cluster analysis, mode identification, new Internet technology and cloud computing technology in the aforementioned CPS entity.
  • the aforementioned metadata of the aforementioned CPS entity are derived from the aforementioned C 3 protocol stack, and the complexity of determining quantity and order of the aforementioned metadata and the randomness of selecting six from N exceeds even a 256-bit RSA (by Ron, Shamir and Adleman at MIT) encryption.
  • the aforementioned Cyber ID sequence can only be obtained by the same transformation matrix in a target user with information of user's own verified and matched the aforementioned Cyber ID
  • the aforementioned Cyber ID model is a set of abstract client, connection and cloud protocol stacks.
  • the aforementioned information entity containing the aforementioned metadata, the aforementioned silicon organism, the aforementioned data structure and optimized information of the aforementioned different time and space stamps, are all objective, and will not change according to data source and combination conditions.
  • the aforementioned C 3 protocol stack can be integrated into traditional network protocol stack.
  • the aforementioned multiple parameters of same the aforementioned cyber entity contain same intrinsic structural relationship to ensure resulting the aforementioned Cyber IDs consistent and valid throughout life cycle of the aforementioned cyber entity.
  • the aforementioned Cyber ID is generated from intrinsic properties of the aforementioned cyber entity and always valid and usable despite changes on network cloud even though comparison or generation algorithm may vary.
  • the aforementioned structural information of the aforementioned Cyber ID contains self-information, and only users under the conditions of self-existence can perform recovery and verification of the aforementioned Cyber ID.
  • the aforementioned Six-degrees-of-Segmentation comprises algorithm randomly choosing six out of many metadata and relationships from the aforementioned 3 ⁇ 3 parameter matrix.
  • the aforementioned Cyber ID can not be authenticated to non-target clients since they have different transformation structures, and a target client has full freedom to accept or reject sharing services with the aforementioned non-target client.
  • the aforementioned cloud server can be a mobile wireless cloud server in either mobile networks or wireless access networks.

Abstract

A new identification (ID) technology comprising unified and standardized object identification within Cyber Space is disclosed based upon intrinsic properties of the entity to be identified. This Cyber Gene ID (or Cyber ID) technology extracts intrinsic information from either the physical users or their cyberspace counterparts, and such information is categorized into client parameters, dynamic parameters, static parameters, cloud parameters, connection parameters and user parameters.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • The present application is a Continuation of U.S. application Ser. No. 13/207,602, filed Aug. 11, 2011, entitled “ CYBER GENE IDENTIFICATION TECHNOLOGY BASED ON ENTITY FEATURES IN CYBER SPACE ” and which is incorporated herein by reference and for all purposes.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to a new identification technology that achieves unified and standardized object identification within Cyber Space. This technology achieves those mentioned above by extracting intrinsic information from either the physical user or their cyberspace counterpart. Such information is categorized into client parameters, dynamic parameters, static parameters, cloud parameters, connection parameters and user parameters. This ID (identification) technology is based upon intrinsic properties of the entity to be identified, and we will call this Cyber Gene ID (or Cyber ID).
  • Using this technology, a person can achieve one to one projection of objects within the Physical Space and objects within the Cyber Space. Such projection will also be two way and can be used to solve current core IT (information technology) issues such as Trusted ID, information security, network security, network credibility, privacy protection, etc.
  • 2. Description of the Related Art
  • With the continuous development of information technology, the cyberspace within Cyber Physical Systems has been in an anonymous and chaotic state. Service providers have little information about users, and users cannot trust each other either. Thus services that can be provided to users are limited due to this nature. As the Internet evolves into forms such as IOT (Internet of Things), ubiquitous network, cloud computing, mobile broadband and SaaS (Software as a Service), the issue has become increasingly prominent and visible, with growing negative impact. From the perspective of commercialization, the number of solutions that focus on local optimization while ignoring global efficiency and impact is also on the rise. The whole networked world is becoming more complex, confusing and costly to maintain. Achieving a unique identity authentication protocol in cyber physical system is the best way to solve the existing problems.
  • For many years, there have been numerous attempts at solving the problem within Cyber Physical Systems (CPS). They include but are not limited to IP (internet protocol) addressing, el 63\164 standard, RFID (radio frequency identifier), URL (Uniform Resource Locator), private protocol etc. But they have not solved the problem of standardization and ubiquity. Those solutions are also highly localized and tailored towards specific types of objects and are not suited for universal deployment.
  • SUMMARY OF THE INVENTION
  • The present invention discloses a method of recognizing cyber space objects by using the natural properties of a cyber-entity (a logical entity that exists independently, and has user properties and information consumption/production properties). It has the universal and natural ability to uniquely identify a user, with functions similar to the biological gene, thus being called “cyber gene”.
  • For example, the PC (personal computer)—based IP address can't uniquely identify a cell phone, but cell phones will be taking the roles of mobile computers in the future. Standards such as E163 and E164 can't uniquely identify a car (In the future, vehicles with computing powers will also be part of the cyber physical space). RFID (radio frequency identifier/identification) is also widely used for “identification”, but it is only a tag rather than a trusted ID. Many other costs and functions are needed at the same time. But in the cyber gene-based invention and discovery, we creatively construct the GID (Global Identification), which can better solve the problems that can't be settled by RFID and other methods.
  • Therefore, those single-dimensional criteria can neither uniquely identify certain objects (insufficient information), nor realize unified authentication for diversified entities or even multiple forms of the same user under different conditions. In addition, it is impossible to comprehensively analyze the user behaviors and share user information. It is also difficult for cyber systems to obtain authentication from trusted organizations such as the government, resulting in the stagnant application and development of a trusted ID system.
  • There also exists many disadvantages with optical identification (such as barcodes) and electromagnetic identification (such as RFID) technologies, such as high TCO (Total Cost of Ownership), easy damage and wear, non-persistency and poor anti-interference. In today's world when the Internet of Things, Ubiquitous Network and Internet are required to be deeply transparent, it is an urgent issue to identify the cyber entity in a trustworthy, standardized and unique manner. This is becoming a core problem regarding information strategies in many countries.
  • Presently, no cyber identification and recognition technology that is applicable to all systems has been discovered. The modern CS (cyber space) applications require the mutual mapping and binding for CS and PS (Physical Space) entities. Their real identities and cyber identities are unique and corresponding to each other, thus realizing the unique identification and recognition of the trusted ID. Through practice and research on some typical cases, the present invention has discovered that the ID structure of an entity may be completely identified by using the structural patterns of a cyber-entity among the client, connection and cloud (C3) data. This ID structure makes sure that there are no two identical cyber entities. By identifying and verifying the unique identity by means of a multi-dimensional matrix constructed by the intrinsic data relations, it differentiates the combination of metadata in a C3 protocol stack sequence structurally from that of metadata in other C3 protocol stack sequences. The technical principle as mentioned in the present invention may apply to any system that requires cyber identification and certification, and it has been proved in practical applications with typical cyber entities such as mobile, personal computer, automobile client and cyber users. Positive results have been obtained in terms of the positioning, tracking, identification, sourcing and anti-counterfeit of the identification-related “real names”. It proves that the technology of the present invention is able to realize the unique identification and accurate verification of the client. In particular, when some parameters of the client is changed, such as in IMEI (International Mobile Equipment Identity) or SIM (Subscriber Identity Module) number of mobile, it is still able to identify the client from the network, thus providing comprehensive business application capabilities while integrating the positioning, privacy and credibility.
  • According to the metadata sets in the natural C3 protocol stack of a cyber entity, the principles of free scale and the six degrees of segmentation between them, the present invention discovers a structural data relationship that distinguishes one cyberspace entity from other entities. Furthermore, the ID data set and structural data relations are used as the “digital DNA” or “cyber DNA” of the cyber entity. Through this method, we find that there are no two identical cyber entities, even if they were of the similar type of client, PC, automobile and electronic devices manufactured by the same manufacturer. This is the cyber gene principle as mentioned in the present invention.
  • According to cyber gene principles, more objective and extensive information can be obtained by adding various natural properties (user parameter, dynamic parameter, static parameter, client parameter, connection parameter and cloud parameter) that can be perceived by users within the connotation scope of the gene (digital DNA). The extended information may help us trace back to the cyber digital gene from the application features. We vividly compare this method to “communication fingerprint” or “cyber digital gene”. It realizes the expression of application-oriented features such as objectiveness, intelligence, uniqueness, security and privacy protection.
  • Based on the considerations above, the present invention defines the following basic terms first:
  • Cyber entity: a logical entity that has independent purposes and management properties in the cyber space such as a set of data, network element, client, user profile or the combination thereof.
  • Protocol stack: individuals of various protocol stacks, protocol stack sequences and protocol stack sequence sets according ISO/OSI (International Organization for Standardization/Open Systems Interconnection model) system structure, and the permutation and combination thereof. The protocol stack also includes various protocol parameters and key data (such as facilities) inside all protocol stacks, and parameters for describing the protocol functions which comprise:
  • Cyber ID: abbreviation of identification generated according to the cyber gene principles.
  • IP: Internet protocol
  • {right arrow over (I)}1: an space-time independent array of data that belongs to the static parameters of the user or cyber entity.
  • {right arrow over (I)}2: an space-time dependent array of data that belongs to the dynamic parameters of the user or cyber entity.
  • {right arrow over (I)}3: an array of data that reflects the cyber behaviors features of the user or cyber entity.
  • {right arrow over (C)}1: a client parameter array at the client side in CS that is related to user or cyber entity.
  • {right arrow over (C)}2: a connection parameter array at the network side in CS that is related to the user or cyber entity. For example, information on the parameters that describes the entity uniqueness in a protocol stack regarding the features of the user or cyber entity.
  • {right arrow over (C)}3: a cloud parameter array at the cloud side in CS that is related to the user or cyber entity.
  • FDNA: a multi-dimensional matrix that constitutes the cyber structural ID, or the function value of cyber ID (Cyber ID).
  • This “structural ID” includes feature elements of the client, connection and cloud protocol stack sequence and some information relations expressed according to the 3×3 parameter matrix constructed up by dynamic and static parameter segmentations related to the user. First of all, the framework is a complete set because from the perspective of information communication, any cyber space activity can be described as some kind of combination and permutation of a few clients, connections and cloud protocol stacks. They may be divided into three categories that are related to the user regardless of whether they are independent or dependent on time. They are the client, connection and cloud protocol stack horizontally and Layer 1˜7+Layer 8 (Application & Service) longitudinally. The information of all cyber entities falls within this scope, and the feature data in C3 track of any cyber entity are all covered. The structural relations between the key metadata on different dimensions can be established in the framework. These data and relations are objective and intrinsic of the entity, therefore, the metadata that are constructed by these randomly selected ID data sets form a novel, natural multi-dimensional code block and a multi-dimensional matrix that can express the unique identity features of an entity, which is a “cyber DNA” structure, i.e. cyber ID.
  • Through intelligently perceiving or obtaining the known multi-dimensional property information of a user (user parameter, dynamic parameter, static parameter, client parameter, connection parameter and cloud parameter), The present invention objectively generates a unique structural identification relationship that may represent an entity according to the principle of “six degrees of segmentation” and reasonable division of the dynamic, static and user feature data structures from the “client, connection and cloud” protocol stack. The structural multi-tuple relationship is similar to the multi-dimensional code, and the difference is that its metadata are all from the entity. At the same time, these metadata and their relations are all natural and objective, which are not artificially defined, hence their inherent standardization.
  • The information communication (or behavior track) process and scope of any cyber entity in cyber space can only fall within the scope of C3 and its combination. The multi-tuple data extracted or sampled from the dynamic and static parameters at different time and different dimensions are natural and objective. For specific cyber entity, its “function value” is verified to be static and the gene functions or gene-tuple formed based on these natural parameters constitute the objective cyber ID.
  • Such unique structural ID realizes features such as non-duplicability, uniqueness (overcoming the disturbance from changes of few factors [such as number and client changes]) and persistency. The cyber ID based on the user's objective element information is constructed by means of the known and intrinsic data and implicit data relations, which is vividly compared to cyber digital DNA. It realizes the objectiveness, trustworthiness, uniqueness, security, completeness and privacy functions of the user and cyber entity in the cyber space.
  • The overall technology of Cyber ID is divided into generation and recognition processes.
  • All these and other introductions of the present invention will become much clear when the drawings as well as the detailed descriptions are taken into consideration.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • For the full understanding of the nature of the present invention, reference should be made to the following detailed descriptions with the accompanying drawings in which:
  • FIG. 1 discloses a flow diagram of cyber ID information extraction and ID sequence generation.
  • FIG. 2 is a multidimensional matrix corresponding to the cyber space formed from the mapping relation.
  • Like reference numerals refer to like parts throughout the several views of the drawings.
  • DESCRIPTION OF THE PREFERRED EMBODIMENT
  • The present invention will be described more fully hereinafter with reference to the accompanying drawings, in which some examples of the embodiments of the present invention are shown. Indeed, the present invention may be embodied in many different forms and should not be construed as limitation to the embodiments set forth herein, rather, these embodiments are provided by way of example so that this disclosure will satisfy applicable legal requirements. Like numbers refer to like elements throughout.
  • The following specification for the implementation of the present invention is made based on the attached drawings.
  • 1. Information Extraction and Cyber ID Generation Process
  • FIG. 1 gives a flow diagram of cyber ID information extraction and ID sequence generation.
  • Cyber ID is subject to the structure of ID function and multidimensional matrix. ID sequence is formed from a 3×3 parameter matrix (step 104) constructed by user parameters, dynamic parameters, static parameters, client parameters, connection parameters and cloud parameters (step 102) via pre-defined mapping rules. The structural logic information of cyber ID is derived from the actual data relation of five types of properties of entities inside the cyber space, i.e. “connection property, cloud property, behavior property, content property and security property”. The array of static parameters that define personal features of a human being or an object does not change with time and space. For example, take the car as the user. The static parameters include VIN (vehicle identification number), engine number, sales manufacturer, sales initial mileage, etc. In case of a human user, the static information parameters include the SSN (social security number), ID information, social relations information, PIM (personal information management), CV (curriculum vitae), etc.
  • The array of dynamic parameters that define the user and does changes with time or space, is, for example, {name, password} pair, personal information (PI), cyber access point, access conditions, etc. The array of user parameters defining the behavioral characteristics of the user is, for example, network footprint, spending habit, position trace, etc. Array is defined by client parameters from the system and client level related to the user. For example, the address book in the client, software and hardware configuration information of the client, widget folder, etc, that indicate which kind is the object or the user, etc. Array is defined by connection parameters from the network level, including network access type, address-like information, network facilities (which can extract a great deal of unique information from the protocol stack), DPI (deep package inspect), communication strategy, position, service facilities, roaming mechanism, etc. Array is further defined by cloud parameters from the service level, indicating type of user service, QOE (Quality of Experience), security level, application environment, etc. These objective system property parameters comprise information of all aspects such as network transmission and service application.
  • Based on the multidimensional matrix (step 106) constructed by these objective information, this matrix is a 3×3 type multidimensional matrix. The vectors of user parameter, dynamic parameter and static parameter are the columns and the vectors of client parameters, connection parameters and cloud parameters are the rows. Client is also divided into user, dynamic and static parts. Connection is also divided into user, dynamic and static network parameters. Cloud also consists of user features, dynamic and static parameters of service level.
  • The parameter value of each dimensionality may be Boolean value, data set, data structure, relation and the said combination, etc. According to the feature requirements of different clients, the 3×3 matrix formed by the value and relations of the elements on each vector will be stored in the cloud server (step 108) of service client, with or without conversion. Any cyber entity may upload its dynamic parameters to the cloud server through real time online function to modify the corresponding parameters in the multidimensional matrix in a real time manner. In the meantime, the structure of cyber ID may also change with the parameters in the matrix.
  • Since the user parameters, dynamic parameters, static parameters, client parameters, connection parameters and cloud parameters (step 102) are all derived from the expression of a physical entity or logical entity in cyber space (such as the whole stack sequence in accordance with ISO/OSI protocol stack), they are an objective mapping of the physical entity or logical entity in the cyber world. In the logical framework of the 3×3 parameter matrix, there are many inherent, intrinsic and distinctive connections among and within data in the nine cells of the matrix. It is in these connections that a stable relation is formed gradually. We can gather these intrinsic relations among data and then apply the six degrees of segmentation principle and small world theory to form a unique data structure with certain values. Those values are then mapped to cyber space (step 104 to step 108), so the one to one projection and binding relation of the physical world and the cyber world are achieved. Consequently, attributes of cyber ID, such as objectiveness, uniqueness, security, feasibility and completeness are established.
  • 2. Cyber ID Recognition Process
  • FIG. 2 is a multidimensional matrix that is corresponding to the cyber space formed from the mapping relation randomly sampled by a third entity. By comparing it with the multidimensional matrix of cyber ID formed from the 3×3 parameter matrix, unique ID recognition can be achieved.
  • Any users (202) in the physical world, either a human being or an object, can acquire and upload its parameter information such as user parameters, dynamic parameters, static parameters, client parameters, connection parameters and cloud parameters to the cloud server according to ID forming process (step 204). The cloud server takes samples of the uploaded data according to the application needs (fraud proof, anti-theft, authentication and charge, etc.) (step 208) by forming a list of all parameters (step 210). Rebuilding a multidimensional sub-matrix according to the data in the list and this sub-matrix is a certain sub-matrix of multidimensional matrix forming the cyber ID, which may be “sparse matrix” after sampling (step 212). Comparing the sampled sub-matrix with the multidimensional matrix formed through the Cyber ID forming process to achieve verification (step 216). If the sampled sub-matrix is coincident with a certain part of the multidimensional matrix formed through the generation process and stored in the cloud sever, i.e. the data and data structure in the multidimensional matrix or the relation among data matches, then matching ID will be the output (step 218). Thus, unique ID recognition process is finished. During the whole process, the data collected is complete, which can reflect the features and characters of all aspects of entity.
  • Further Implementation Details
  • The cyber ID technology disclosed by the present invention impacts identification procedure for elements in the cyber systems such as equipment, standards, the processing, transportation, management and control of information. The technologies covered include from simple technologies to advanced technologies and from cyber entity, client, connection and cloud, regardless if it is in a dynamic environment or static environment. The object of the present identification and recognition technology has the features of both CS and PS owners and has unique mapping of real name and anonymity in CS and PS, thus it is global cyber digital gene identification system in CS and informational PS.
  • The present invention solves the problem of cyber entity trusted ID recognition in the field of cyber and physical system (CPS), IOT (internet of things). The mapping between physical space (PS) and cyber space (CS) and the inter-mapping between real name and fake name in the PS and CS (real name and real name, real name and fake name, fake name and real name, fake name and fake name) can be achieved by using this method. It is possible to comprehensively describe the property of each cyber entity in an objective manner in CS. In the meantime, according to the actual requirements and background, the network efficiency and some online functions (for example, using the security mechanism of cyber gene technology for encryption and privacy, global network positioning, global unique identification, personalized trace and monitoring, multiple identification system (SSO: signal sign on), good faith transaction and payment, intelligent cloud computing sharing platform, etc.) may be enhanced greatly, thus forming the core foundation of all kinds of solutions in the application of next generation CPS and Internet of Things.
  • The cyber ID abstracted by using the structural information of cyber personalized entity in the client, connection and cloud system shares the features with biological genes. First of all, it is objective and unique. Then it is safe, has privacy protection and is intelligent. It can be used as a unique technical method to identify any entity in cyber space, and to solve the current inseparable problem of address and identification and many problems that are common in communication, which were difficult to settle before, such as ID, privacy protection, information security, good faith transaction, border invasion and cyber fraud.
  • In conclusion, the present invention is summarized as follows:
  • The present invention provides a technology for achieving the consistent and unique identification and authentication of cyber and physical space entities by extracting various physical or virtual, user's intrinsic and objective property information (user parameter, dynamic parameter, static parameter, client parameter, connection parameter and cloud parameter) from the cyber world in cyber space (CS), and a genetic digital ID (cyber ID) method based on the 3×3 parameter matrix in cyber space. The method consists of the acquisition of cyber entity structure information, generation process of cyber ID as well as the analysis, validation and identification processes of cyber ID. Anything that is in accordance with the above principle and business process and takes the following methods or thoughts belongs to the scope of this patent.
  • A method is disclosed to create a trusted and unique identity for a network entity from its intrinsic properties. The properties are based on the network entity's client, connection and cloud protocol stacks. The static and dynamic properties and the combination order of those protocol stacks make up the system the trusted identity is based upon.
  • 1) Cyber Genetic Information Extraction and Cyber ID Generation Process
  • Cyber ID is determined by the relational structure amongst the multi-dimensional ID matrix elements. The ID sequence and matrix elements are generated by the 3×3 grid matrix that is built by user parameters, dynamic parameters, static parameters, client parameters, connection parameters and cloud parameters in accordance with specific mapping rules. The structural information of cyber ID originates from the data relations of five properties of “cyber property, service property, behavioral property, content property and security property” on the intrinsic and inherent service of the entity in cyber space. The array that defines the individual characteristics of the user or logic object and doesn't vary with time and space on the static parameter dimension is, for example, the automobile acts as the inherent parameter, including VIN, engine No., sales of manufacturers, initial mileage of sales and so on; the people act as the inherent information parameter, including user ID information, social relation information, resume and so on; cyber information parameter include the cyber type, DPI, cyber Facilities used in communication, IP address, roaming property and so on. The array that defines the user on dynamic parameter dimension is, for example, (user name, command) pair, password, service cyber facilities (such as Proxy, Email) and so on. The array that defines and reflects the users' behavioral characteristics on the user parameter dimension is, for example, consumption behavior, action path, cyber addiction, etc. It is required to define the client parameter array from the angle of system and from the client layer. For example, the client property information indicates that the user belongs to which scope of objects or which kind of users. It is required to define the connection parameter array from the cyber layer, including the cyber type, access facility, position and other cyber information. It is also required to define the cloud parameter array from the service layer to indicate the type of user service and service demand, etc. All these system property parameters contain the information in all aspects of the network. The transmission application and the information is objective.
  • As for the multi-dimensional matrix in the form of a 3×3 grid that is created based on these objective information, its rows consists of three dimensional vectors of user parameters, dynamic parameters and static parameters, and columns consists of three dimensional vectors of client parameters, connection parameters and cloud parameters. The parameter of each dimension contains various elements that describe the parameter and relationships among elements and relational structure. In such cases, even some of the metadata changes, the relational structure will not. Therefore, it is a composite data entity that contains a large amount of inherent information and self-characteristics. According to the characteristics of different clients and/or users, the value of element in each scope can be real values (indicated by Boolean, relation, collection, array, data or arbitral data) or “null value”. The multi-dimensional arrays formed in such ways will be stored in the cloud server of the service end through the encryption and exchange. The client or user may upload his/her own dynamic parameter to the cloud server in real time online to change and synchronize the parameter in the multi-dimensional array in real time. As long as the relational structures among the key parameters do not change, the change of dynamic information will not affect its original data structure, and thus, the digital signature will not be changed. However, the “digital DNA” will be changed gradually. By making use of such a characteristic, the present invention is able to create the algorithms of trusted ID and trusted ID recognition.
  • 2) Cyber ID Recognition Process
  • Any user in the physical world, whether a human user or machine, can upload their own key parameter information in the 3×3 parameter matrix to the cloud server in real time. The information is sufficient and the cloud server handles user parameters, dynamic parameters, static parameters, client parameters, connection parameters and cloud parameters in all dimensions for the uploaded data based on the demands of application (anti-counterfeiting, encryption, authentication, financial transactions, etc.), forming a list of all attributes and restoring all property relationships. And then it is required to rebuild part of the multi-dimensional sub-matrix based on the list. The sub-matrix is one sub-matrix of the multi-dimensional matrix that forms the cyber ID and it can be of sparse type. It is important to compare the sampling sub-matrix formed with the multi-dimensional matrix that is formed in the entire 3×3 parameter matrix and stored in the cloud server focusing on the structural data relation under the principles of six degrees of segmentation and Scale Free Rules. It is determined through the comparison that, if the sampling sub-matrix fits with the ID array that is formed through the 3×3 parameter matrix and stored in the cloud server in FIG. 1 on enough (sufficient and necessary) key structural information, that is, the data in multi-dimensional matrix, data structure or the relation among data fits, then the output result of determination is that the identity is either matched, or the identity isn't matched. In this way, the unique identity recognition process is completed. The entire process requires that the information collected is sufficient and can reflect the features and characteristics of the entity in all aspects with high fidelity.
  • Characteristics of cyber ID sequence produced by the method involved in the present invention include:
  • 1) Objectivity and Follows Natural Standard
  • The scope of this patent includes the adoption of limited relational information and data structure that are implied in the invariable structure between the inherent information and information of the CP entity as the entity identification (we call it as cyber DNA ID, or cyber ID for short), and corresponding implementation techniques and methods.
  • The user parameters, dynamic parameters, static parameters, client parameters, connection parameters and cloud parameters that form the cyber ID contain necessary information that can embody and describe the cyber entity on the network path and the information are used in the basic communication, PIM (Personal Information Manager), communication facility, resource service facility, dynamic cache (dynamic data) and service platforms. In cyber spaces, these information parameters are objective. And the arrays and data that are constituted by these objective and natural information are also objective. For example, the parameters that come from the cyber consensus or defaulted parameters that are composed of user network mode, VPN (virtual private network) and QOS (quality of service), access information and position information are also parameters existed rather than artificially defined subjective parameters. Based on these objective parameters and the extraction of their relations, the cyber ID that is constituted through the exchange has a stable and sole ability of representing the user properties. The arrays that are composed of these parameters have the orthogonal property and are sole and objective and they are also unique. All property elements contained in the cyber ID structure are mappings from the physical information space without any artificial intervention. Therefore, the cyber ID is objective.
  • The client, connection and cloud (C3) parameters objectively exist in the protocol stack during the information communication process, and they are also the combinations of all the information communication behaviors. The information communication process and scope of any cyber entity in the cyber space can only be within the scope of C3 and its assembly. The metadata that is extracted at different time from different parameters or built by sampling is also natural and objective. As for the specified cyber entity, its “functional value” (data and its structural relation in array) is verified as unchangeable. And the objective cyber ID is composed of these genetic variables and natural parameters.
  • 2) Uniqueness
  • Cyber ID can be regarded as a combination of intrinsic and objective properties of an information entity. Mathematically, it is a function integrating various metadata and features, metadata combination, combinational relationships, data structure properties and key properties of different time stamps and space stamps of a silicon-based organism (the general term of various electronic chip devices with intelligent control mechanism). Information of all these functions is derived from the organism's natural existence. The structural relations of data are unique (because the multi-dimensional identification is adopted and the principle of six degrees of segmentation is abided by), therefore, no two entities are identical. The uniqueness also enhances the anti-interference capacity of ID system, since false positive verification will not occur due to matching properties on single criteria.
  • 3) Security
  • The security of cyber ID is determined by unique ID functions and matrix transformations. Due to the uniqueness of cyber ID, it is impossible to speculate different 6-degree relation sequences, and it is also uncertain to choose which six degrees. They have different time and space stamps. The combinational elements here are the “client, connection and cloud” protocol stack, and all metadata of the cyber entity are derived from C3. But the complexity of determining the quantity and order of metadata and the randomness of selecting 6 from N exceeds even 256-bit RSA encryption. At the same time, the cyber ID sequence can only obtain the same transformation matrix in the target user under the condition that it has the information on the user's own verified and matched cyber ID. For non-target user or business, such ID can't be identified, and it is unknown and unavailable. Therefore, forced authorization is impossible.
  • Therefore, the cyber ID-based encryption is safe for both the users and businesses, and it guarantees the security of information communication and exchange.
  • The cyber ID has the unique and objective features similar to biological DNA, and different clients and businesses have different ID sequence structures (structural relation features)—a gene code. Only the users or businesses that have their own gene code can have an access to the cyber resources, which are unknown and unavailable to the outside world and can't be separated from the entity. Just like no one can authorize their own biometric data for other people to use.
  • 4) Privacy
  • The uniqueness and security of the cyber gene can't be authorized, which is different from password or other forms. It can not be transferred, copied or plagiarized, thus having advantages in protecting the privacy, as what is said, “My information is in my hand”.
  • The information included in the cyber ID is self-information, and the recovery and verification of ID can only be obtained by users under the conditions of self-existence. It is not some known or defined multi-dimensional code. Based on such objective, portable and unique cyber ID, users can use their own information only when they are their true self. Only then are they allowed to proceed to use those information for application purposes.
  • Other users or business cannot identify the cyber ID of the non-target client since they have different transformation structures, and the target client has the freedom to accept or reject sharing services with such non-target client. Different types of businesses can be integrated via the cloud computing means to cooperatively complete different tasks. At the same time, such process is invisible and shielded to the client. Therefore, with the cyber ID-based objective, unique and safe identification, the business end can perceive the user's behaviors and environment to achieve exclusivity, and also better protect the user's private information.
  • The objectiveness, uniqueness, security and privacy of cyber ID are intertwined with each other. Objectiveness is a basis for realizing the uniqueness feature, because the uniqueness of cyber ID depends on the objectiveness and natural standard of data collected from the physical world. The objectiveness and uniqueness also determine the security of ID. These three features also determine the inseparability between ID and the user, i.e. the intrinsic privacy protection feature.
  • 5) Trustworthiness
  • Cyber ID is obtained by extracting the information and metadata of the known C3 protocol stack sequence. A unique, multi-dimensional and objective information array can be constructed by means of the user's intrinsic basic communication information, PIM information, communication facility information, resource information, dynamic cache information and user behavior information.
  • The trustworthiness and reliability of Cyber ID are derived from previously mentioned objectiveness, uniqueness, security, privacy and accompanying and also from the non- mutability of the relational structure and objective data. In addition, based on various information security algorithms available, the user's cyber DNA can be rapidly obtained and then compared by means of the mathematical modeling, data mining and cluster analysis, mode identification, new internet technology and cloud computing technology. This process of generating and using cyber DNA is also a trustworthy technology.
  • 6) Solution Completeness (Sufficiency and Necessity)
  • The cyber gene ID is a subset of the information set of a cyber entity within the scope of C3 (client, connection and cloud protocol stack) that covers the user information, dynamic information and static information of the user or cyber entity. Any trusted and self ID information and metadata must fall within such scope. Therefore, the expression of the 3×3 parameter matrix is sufficient. In cyber space, any information involving the exchange and communication is certainly from the protocol stack of some entity, because the network space is consisted of a lot of protocol stacks and protocol stack sequences, with the information flows between and inside the protocol stacks. The cyber gene model is a set of the abstract client, connection and cloud protocol stack. Therefore, it is a complete set, which is both necessary and sufficient.
  • In addition, for any cyber ID to remain trustworthy and unique, it must conform to the features of objectiveness, uniqueness, addressability, security and privacy. Thus these features are also necessary. Information of all functions, such as the metadata set, “silicon organism” feature metadata, structural relations of data, and optimized information of different time and space scales, are all objective, and the “function value” will not change according to the data source and combination conditions. Therefore, the multi-dimensional vector constructed by such method may uniquely and fully identify the users.
  • In summary, the present invention comprises the following disclosures:
  • A Cyber Identification (ID) system that achieves fully secure, unique and consistent identification and authentication of entities within a Cyber-Physical Space (CPS), the aforementioned system comprising:
      • a) A form of identification based on intrinsic properties of the aforementioned CPS entity,
      • b) Subsystem of the aforementioned CPS entity described by a combination of six properties including client, connection, cloud, user, static and dynamic properties, based on network theories and cyberspace structures,
      • c) Subsystem constructed from parameters of the aforementioned CPS entity: user parameters, dynamic parameters, static parameters, client parameters, connection parameters and cloud parameters, wherein the aforementioned parameters are unique to the aforementioned entity, much like biological DNA and thus impossible to counterfeit,
      • d) An identification unit composed of the aforementioned properties of the aforementioned CPS entity's hardware, communication protocol stacks, client level software and relationships wherein no two separate the aforementioned CPS entities can have the exact same the aforementioned identification unit,
      • e) An operation pattern for the aforementioned CPS entity remaining relatively consistent and without significant change to the aforementioned CPS entity's hardware or network protocol stack,
      • f) A combination of intrinsic and objective properties of an information entity that is a function integrating various metadata and features, metadata combination, combinational relationships, data structure properties and key properties of different time stamps and space stamps of a silicon-based organism which is the general term of various electronic chip devices with intelligent control mechanism, wherein information of the aforementioned functions is derived from the aforementioned organism's natural existence,
      • g) A security unit of the aforementioned Cyber IDs determined by unique identification (ID) functions and matrix transformations, which is largely related to an uniqueness of the aforementioned Cyber ID and a method of the aforementioned Cyber ID generation to ensure user and business privacy,
      • h) A complete CPS entity identification subsystem which is a subset of information set of a network entity within scope of C3 (client, connection and cloud) protocol stack that cover user information, dynamic information and static information of a cyber entity, and can fully and uniquely identify the aforementioned CPS entities and serve as a standalone identification protocol, and
      • i) A unique structural relationship of data wherein a multi-dimensional identification is adopted and a principle of six degrees of separation is abided by to ensure no two entities are identical.
  • The aforementioned Cyber ID includes adoption of limited relational information and data structure that are implied in the invariable structure of inherent information of the aforementioned CPS entity as an entity identification, further comprising:
      • a) The aforementioned client, connection and cloud (C3) parameters objectively existing in a protocol stack during information communication process, and also in combination of all information communication behaviors, wherein the aforementioned information communication process and scope of any the aforementioned CPS entity in a cyber space can only be within scopes of the aforementioned C3 and its assembly, and the aforementioned metadata extracted at different time from different parameters or built by sampling is also natural and objective, and the aforementioned objective Cyber ID is composed of the aforementioned genetic variables and natural parameters, and
      • b) The aforementioned user parameters, dynamic parameters, static parameters, client parameters, connection parameters and cloud parameters used to generate the aforementioned Cyber ID containing necessary information that can embody and describe the aforementioned CPS entity on network path and the aforementioned information used in basic communication, PIM (Personal Information Manager), communication facility, resource service facility, dynamic cache (dynamic data), user behavior information and service platforms, wherein in the aforementioned cyber spaces, the aforementioned information parameters are objective, and arrays and data constituted by the aforementioned objective and natural information are also objective.
  • The aforementioned Cyber ID has a stable and sole ability of representing user properties, and the aforementioned arrays composed of the aforementioned parameters have an orthogonal property and are sole, objective and also unique.
  • The aforementioned property elements contained in the aforementioned Cyber ID structure are mappings from physical information space without any artificial intervention, and therefore the aforementioned Cyber ID is objective.
  • The aforementioned Cyber ID can be obtained by extracting the aforementioned information and the aforementioned metadata of the aforementioned C3 protocol stack sequence.
  • The aforementioned Cyber ID can also be obtained and compared by means of mathematical modeling, data mining and cluster analysis, mode identification, new Internet technology and cloud computing technology in the aforementioned CPS entity.
  • The aforementioned metadata of the aforementioned CPS entity are derived from the aforementioned C3 protocol stack, and the complexity of determining quantity and order of the aforementioned metadata and the randomness of selecting six from N exceeds even a 256-bit RSA (by Ron, Shamir and Adleman at MIT) encryption.
  • The aforementioned Cyber ID sequence can only be obtained by the same transformation matrix in a target user with information of user's own verified and matched the aforementioned Cyber ID
  • The aforementioned Cyber ID model is a set of abstract client, connection and cloud protocol stacks.
  • The aforementioned information entity containing the aforementioned metadata, the aforementioned silicon organism, the aforementioned data structure and optimized information of the aforementioned different time and space stamps, are all objective, and will not change according to data source and combination conditions.
  • The aforementioned C3 protocol stack can be integrated into traditional network protocol stack.
  • A method to generate a unique Cyber ID (Identification) for any objects within a Cyber-Physical Space (CPS), the aforementioned method comprising:
      • a) The aforementioned Cyber ID determined by a relational structure amongst multi-dimensional ID (identification) matrix elements generated by a 3×3 matrix built by specific mapping rules and user parameters, dynamic parameters, static parameters, client parameters, connection parameters, and cloud parameters extracted from a cyber entity,
      • b) Columns of the aforementioned 3×3 identity matrix consisted of client parameters, connection parameters and cloud parameters, and rows of the aforementioned matrix consisted of user parameters, dynamic parameters and static parameters, wherein the aforementioned relationship data is stored within the aforementioned 3×3 matrix for different types of parameters,
      • c) Choosing parameters from the aforementioned 3×3 matrix which is relatively unique to the aforementioned cyber entity, and also has relatively unique relations of its various attributes to construct an internal structure relationship diagram for the aforementioned cyber entity optimized for searching and identification using six-degrees of separation principal,
      • d) Structural information of the aforementioned Cyber ID originating from data relationship of network properties, service properties, behavioral properties, content properties and security properties of the aforementioned cyber entity, and the aforementioned structural relationship data being a crucial part to the aforementioned Cyber ID which reinforces the aforementioned Cyber ID's capability of uniquely identifying the aforementioned cyber entities,
      • e) The aforementioned Cyber ID possessing a high degree of privacy and security guarantee due to multiplicity of composing data and relations, complexity of structural data and non-symmetrical information,
      • f) The aforementioned 3×3 parameter matrix of the aforementioned cyber entity used to generate a unique and secure the aforementioned Cyber ID by using specific mapping and transformation rules based on principal of Six-degrees-of-Segmentation, and being practically impossible to brute force matrix transformation combination due to vast number of possible combinations of metadata, wherein the aforementioned transformation sequence has security level exceeds even that of 256-bit RSA (by Ron, Shamir and Adleman at MIT) encryption, and
      • g) Generated the aforementioned Cyber ID be paired with the aforementioned entity and be stored in a cloud server for future references, identification and authorization purposes.
  • The aforementioned multiple parameters of same the aforementioned cyber entity contain same intrinsic structural relationship to ensure resulting the aforementioned Cyber IDs consistent and valid throughout life cycle of the aforementioned cyber entity.
  • The aforementioned Cyber ID is generated from intrinsic properties of the aforementioned cyber entity and always valid and usable despite changes on network cloud even though comparison or generation algorithm may vary.
  • The aforementioned structural information of the aforementioned Cyber ID contains self-information, and only users under the conditions of self-existence can perform recovery and verification of the aforementioned Cyber ID.
  • The aforementioned Six-degrees-of-Segmentation comprises algorithm randomly choosing six out of many metadata and relationships from the aforementioned 3×3 parameter matrix.
  • A method to recognize, match and authenticate a Cyber ID (identification) to achieve identification and authentication of a Cyber-Physical Space (CPS) entities, the aforementioned method comprising:
      • a) Any users in physical world, whether human or machine, being able to upload own key parameter information in the form of a 3×3 parameter matrix to a cloud server in real-time,
      • b) The aforementioned cloud server forming a list of all attributes and restoring partially key parameter relationships of the aforementioned entity from the aforementioned uploaded 3×3 parameter matrix,
      • c) The aforementioned cloud server building a multi-dimensional sub-matrix from the aforementioned parameters collected, and this re-build process utilizing a stored matrix transformation sequence of the aforementioned CPS entity, wherein the aforementioned resulting sub-matrix will then be compared to the aforementioned original 3×3 parameter matrix of the aforementioned entity stored in the aforementioned cloud server, and the aforementioned comparison will be focused on structural data relationships under principles of six degrees of separation and Scale Free Rules, with results returned as either positive or negative,
      • d) Performing multiple iterations of generation and comparison to ensure validity of identification, and each iteration following above same procedure, and
      • e) Speed of recognition subject to quality and effectiveness of information contained in the aforementioned sub-matrix.
  • The aforementioned Cyber ID can not be authenticated to non-target clients since they have different transformation structures, and a target client has full freedom to accept or reject sharing services with the aforementioned non-target client.
  • The aforementioned cloud server can be a mobile wireless cloud server in either mobile networks or wireless access networks.
  • The above specification and claims, as well as the ideas and logic process, specific operation and implementation concept constitute the core of this patent and the overall scope of claims.
  • The system and method of the present invention are not meant to be limited to the aforementioned experiment, and the subsequent specific description utilization and explanation of certain characteristics previously recited as being characteristics of this experiment are not intended to be limited to such techniques.
  • Many modifications and other embodiments of the present invention set forth herein will come to mind to one ordinary skilled in the art to which the present invention pertains having the benefit of the teachings presented in the foregoing descriptions. Therefore, it is to be understood that the present invention is not to be limited to the specific examples of the embodiments disclosed and that modifications, variations, changes and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims (20)

What is claimed:
1. A method to generate and recognize a unique Cyber ID (Identification) for any objects within a Cyber-Physical Space (CPS), said method comprising:
a) Said Cyber ID determined by a relational structure amongst multi-dimensional ID (identification) matrix elements generated by a 3×3 matrix built by specific mapping rules and user parameters, dynamic parameters, static parameters, client parameters, connection parameters, and cloud parameters extracted from a CPS entity,
b) Columns of said 3×3 identity matrix consisted of client parameters, connection parameters and cloud parameters, and rows of said matrix consisted of user parameters, dynamic parameters and static parameters, wherein said relationship data is stored within said 3×3 matrix for different types of parameters,
c) Choosing parameters from said 3×3 matrix which is relatively unique to said cyber entity, and also has relatively unique relations of its various attributes to construct an internal structure relationship diagram for said cyber entity optimized for searching and identification using six-degrees of separation principal,
d) Structural information of said Cyber ID originating from data relationship of network properties, service properties, behavioral properties, content properties and security properties of said cyber entity, and said structural relationship data being a crucial part to said Cyber ID which reinforces said Cyber ID's capability of uniquely identifying said cyber entities,
e) Said Cyber ID possessing a high degree of privacy and security guarantee due to multiplicity of composing data and relations, complexity of structural data and non-symmetrical information,
f) Said 3×3 parameter matrix of said cyber entity used to generate a unique and secure said Cyber ID by using specific mapping and transformation rules based on principal of Six-degrees-of-Segmentation, and being practically impossible to brute force matrix transformation combination due to vast number of possible combinations of metadata, wherein said transformation sequence has security level exceeds even that of 256-bit RSA (by Ron, Shamir and Adleman at MIT) encryption,
g) Generated said Cyber ID be paired with said entity and be stored in a cloud server for future references, identification and authorization purposes, and
h) Said Cyber ID to be recognized, matched and authenticated.
2. The method as recited in claim 1, wherein said Cyber ID to be recognized, matched and authenticated to achieve identification and authentication of CPS entities, said method comprising:
a) Any users in physical world, whether human or machine, being able to upload own key parameter information in the form of a 3×3 parameter matrix to a cloud server in real-time,
b) Said cloud server forming a list of all attributes and restoring partially key parameter relationships of said entity from said uploaded 3×3 parameter matrix,
c) Said cloud server building a multi-dimensional sub-matrix from said parameters collected, and this re-build process utilizing a stored matrix transformation sequence of CPS entity, wherein said resulting sub-matrix will then be compared to said original 3×3 parameter matrix of said entity stored in said cloud server, and said comparison will be focused on structural data relationships under principles of six degrees of separation and Scale Free Rules, with results returned as either positive or negative,
d) Performing multiple iterations of generation and comparison to ensure validity of identification, and each iteration following above same procedure, and
e) Speed of recognition subject to quality and effectiveness of information contained in said sub-matrix.
3. The method as recited in claim 1, wherein said multiple parameters of same said cyber entity contain same intrinsic structural relationship to ensure resulting said Cyber IDs consistent and valid throughout life cycle of said cyber entity.
4. The method as recited in claim 1, wherein said Cyber ID is generated from intrinsic properties of said cyber entity and always valid and usable despite changes on network cloud even though comparison or generation algorithm may vary.
5. The method as recited in claim 1, wherein said structural information of said Cyber ID contains self-information, and only users under the conditions of self-existence can perform recovery and verification of said Cyber ID.
6. The method as recited in claim 1, wherein said Six-degrees-of-Segmentation comprises algorithm randomly choosing six out of many metadata and relationships from said 3×3 parameter matrix.
7. The method as recited in claim 2, wherein said Cyber ID can not be authenticated to non-target clients since they have different transformation structures, and a target client has full freedom to accept or reject sharing services with said non-target client.
8. The method as recited in claim 2, wherein said cloud server can be a mobile wireless cloud server in either mobile networks or wireless access networks.
9. The method as recited in claim 1, wherein said Cyber ID has a stable and sole ability of representing user properties wherein said properties' elements contained in said Cyber ID structure are mappings from physical information space without any artificial intervention, and therefore said Cyber ID is objective.
10. The method as recited in claim 1, wherein said Cyber ID can be obtained and compared by means of mathematical modeling, data mining and cluster analysis, mode identification, new Internet technology and cloud computing technology in said CPS entity.
11. The method as recited in claim 1, wherein sequence of said Cyber ID can only be obtained by the same transformation matrix in a target user with information of user's own verified and matched said Cyber ID.
12. The method as recited in claim 1, wherein said Cyber ID model is a set of abstract client, connection and cloud protocol stacks.
13. The method as recited in claim 2, wherein said key parameter information containing metadata, silicon organism, data structure and optimized information of different time and space stamps, is objective, and will not change according to data source and combination conditions.
14. The method as recited in claim 1, wherein parameter value of each dimensionality of said 3×3 matrix may be Boolean value, data set, data structure, relation and their combination.
15. The method as recited in claim 1, wherein any said CPS entity may upload its dynamic parameters to said cloud server through real time online function to modify, change and synchronize corresponding parameters in said 3×3 matrix in a real time manner.
16. The method as recited in claim 15, wherein as long as relational structures among said parameters do not change, the change of dynamic information will not affect its original data structure, and thus, digital signature will not be changed, but said Cyber ID will be changed gradually so that algorithms of trusted ID and trusted ID recognition can be created.
17. The method as recited in claim 15, wherein said parameters in uploaded data by said CPS entity are based on demands of application such as anti-counterfeiting, encryption, authentication or financial transactions, forming a list of all attributes and restoring all property relationships, then rebuilding part of multi-dimensional sub-matrix of said 3×3 matrix based on said list wherein said sub-matrix is one sub-matrix of said 3×3 matrix that forms said Cyber ID and it can be of sparse type.
18. The method as recited in claim 1, wherein protocol stack based on said client parameters, connection parameters and cloud parameters can be integrated into traditional network protocol stack.
19. The method as recited in claim 1, wherein security of said Cyber ID is determined by unique ID functions and matrix transformations, and it is impossible to speculate different six-degree relation sequences, with different time and space stamps.
20. The method as recited in claim 1, wherein information included in said Cyber ID is self-information, and recovery and verification of said Cyber ID can only be obtained by users themselves because each said Cyber ID has a different transformation structure, and therefore, with said Cyber ID-based objective, unique and safe identification, user's private information is fully protected.
US14/326,164 2011-08-11 2014-07-08 Cyber gene identification technology based on entity features in cyber space Expired - Fee Related US9253181B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US14/326,164 US9253181B2 (en) 2011-08-11 2014-07-08 Cyber gene identification technology based on entity features in cyber space
US14/959,372 US9635016B2 (en) 2011-08-11 2015-12-04 Cyber gene identification technology based on entity features in cyber space

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/207,602 US8832808B2 (en) 2011-08-11 2011-08-11 Cyber gene identification technology based on entity features in cyber space
US14/326,164 US9253181B2 (en) 2011-08-11 2014-07-08 Cyber gene identification technology based on entity features in cyber space

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/207,602 Continuation US8832808B2 (en) 2011-08-11 2011-08-11 Cyber gene identification technology based on entity features in cyber space

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/959,372 Continuation US9635016B2 (en) 2011-08-11 2015-12-04 Cyber gene identification technology based on entity features in cyber space

Publications (2)

Publication Number Publication Date
US20140325625A1 true US20140325625A1 (en) 2014-10-30
US9253181B2 US9253181B2 (en) 2016-02-02

Family

ID=45065524

Family Applications (3)

Application Number Title Priority Date Filing Date
US13/207,602 Active 2032-01-22 US8832808B2 (en) 2011-08-11 2011-08-11 Cyber gene identification technology based on entity features in cyber space
US14/326,164 Expired - Fee Related US9253181B2 (en) 2011-08-11 2014-07-08 Cyber gene identification technology based on entity features in cyber space
US14/959,372 Active US9635016B2 (en) 2011-08-11 2015-12-04 Cyber gene identification technology based on entity features in cyber space

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/207,602 Active 2032-01-22 US8832808B2 (en) 2011-08-11 2011-08-11 Cyber gene identification technology based on entity features in cyber space

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/959,372 Active US9635016B2 (en) 2011-08-11 2015-12-04 Cyber gene identification technology based on entity features in cyber space

Country Status (1)

Country Link
US (3) US8832808B2 (en)

Families Citing this family (61)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9015860B2 (en) 2011-09-24 2015-04-21 Elwha Llc Behavioral fingerprinting via derived personal relation
US8869241B2 (en) 2011-09-24 2014-10-21 Elwha Llc Network acquired behavioral fingerprint for authentication
US9083687B2 (en) 2011-09-24 2015-07-14 Elwha Llc Multi-device behavioral fingerprinting
US9729549B2 (en) 2011-09-24 2017-08-08 Elwha Llc Behavioral fingerprinting with adaptive development
US8713704B2 (en) 2011-09-24 2014-04-29 Elwha Llc Behavioral fingerprint based authentication
US9298900B2 (en) 2011-09-24 2016-03-29 Elwha Llc Behavioral fingerprinting via inferred personal relation
US9825967B2 (en) 2011-09-24 2017-11-21 Elwha Llc Behavioral fingerprinting via social networking interaction
US20130191887A1 (en) * 2011-10-13 2013-07-25 Marc E. Davis Social network based trust verification Schema
US9621404B2 (en) 2011-09-24 2017-04-11 Elwha Llc Behavioral fingerprinting with social networking
US8689350B2 (en) 2011-09-24 2014-04-01 Elwha Llc Behavioral fingerprint controlled theft detection and recovery
US8555077B2 (en) 2011-11-23 2013-10-08 Elwha Llc Determining device identity using a behavioral fingerprint
US9348985B2 (en) * 2011-11-23 2016-05-24 Elwha Llc Behavioral fingerprint controlled automatic task determination
US20130133054A1 (en) * 2011-09-24 2013-05-23 Marc E. Davis Relationship Based Trust Verification Schema
CN102594807A (en) * 2012-02-02 2012-07-18 江苏南亿迪纳数字科技发展有限公司 Network gene recognition method based on entity self characteristics in information space
CN102752367B (en) * 2012-05-30 2014-09-17 江苏南亿迪纳数字科技发展有限公司 Global automobile wisdom perception and unified identification system based on group identification (GID)
CN102685249B (en) * 2012-05-30 2015-08-05 江苏南亿迪纳数字科技发展有限公司 There is GID system and the terminal identity recognition methods thereof of global ubiquitous communication function
US9639678B2 (en) * 2012-06-29 2017-05-02 Microsoft Technology Licensing, Llc Identity risk score generation and implementation
CN102790721A (en) * 2012-08-09 2012-11-21 福建物联天下信息科技有限公司 Internet of Things routing method and system as well as router
CN103051672B (en) * 2012-11-21 2016-02-10 中兴通讯股份有限公司 End message acquisition methods in a kind of heterogeneous terminals environment and device
US9230072B1 (en) * 2012-12-17 2016-01-05 Creative Information Technology, Inc. Dynamic identity program templates
CN105187293A (en) * 2015-07-23 2015-12-23 柳州正高科技有限公司 Method for storing Internet of Things temporary message
CN105141578A (en) * 2015-07-23 2015-12-09 柳州正高科技有限公司 Message generation method of IOT (Internet of Things)
CN105336172B (en) * 2015-10-16 2017-12-22 江苏南亿迪纳数字科技发展有限公司 A kind of electronic license plate based on network digital gene and car networking addressing method
US10681074B2 (en) * 2015-10-28 2020-06-09 Qomplx, Inc. System and method for comprehensive data loss prevention and compliance management
US10558785B2 (en) 2016-01-27 2020-02-11 International Business Machines Corporation Variable list based caching of patient information for evaluation of patient rules
US10528702B2 (en) 2016-02-02 2020-01-07 International Business Machines Corporation Multi-modal communication with patients based on historical analysis
US10685089B2 (en) 2016-02-17 2020-06-16 International Business Machines Corporation Modifying patient communications based on simulation of vendor communications
US11037658B2 (en) 2016-02-17 2021-06-15 International Business Machines Corporation Clinical condition based cohort identification and evaluation
US10565309B2 (en) 2016-02-17 2020-02-18 International Business Machines Corporation Interpreting the meaning of clinical values in electronic medical records
US10937526B2 (en) 2016-02-17 2021-03-02 International Business Machines Corporation Cognitive evaluation of assessment questions and answers to determine patient characteristics
US10395330B2 (en) * 2016-02-17 2019-08-27 International Business Machines Corporation Evaluating vendor communications for accuracy and quality
US10437957B2 (en) 2016-02-17 2019-10-08 International Business Machines Corporation Driving patient campaign based on trend patterns in patient registry information
US10311388B2 (en) 2016-03-22 2019-06-04 International Business Machines Corporation Optimization of patient care team based on correlation of patient characteristics and care provider characteristics
US10923231B2 (en) 2016-03-23 2021-02-16 International Business Machines Corporation Dynamic selection and sequencing of healthcare assessments for patients
US10482543B2 (en) * 2016-05-12 2019-11-19 Kurt B. Schuh Apparatus and method for validating transactional data
CN106789275B (en) * 2016-12-27 2020-06-16 上海科梁信息工程股份有限公司 Power transmission network security test system and method for electric power system
CN108881346B (en) * 2017-05-12 2020-10-30 中国人民解放军信息工程大学 Network space entity resource visualization method and system for location-oriented service
US10999296B2 (en) 2017-05-15 2021-05-04 Forcepoint, LLC Generating adaptive trust profiles using information derived from similarly situated organizations
US10129269B1 (en) 2017-05-15 2018-11-13 Forcepoint, LLC Managing blockchain access to user profile information
US9882918B1 (en) 2017-05-15 2018-01-30 Forcepoint, LLC User behavior profile in a blockchain
US10333913B2 (en) 2017-05-15 2019-06-25 International Business Machines Corporation Dynamic object passwords
US10862927B2 (en) 2017-05-15 2020-12-08 Forcepoint, LLC Dividing events into sessions during adaptive trust profile operations
US10943019B2 (en) 2017-05-15 2021-03-09 Forcepoint, LLC Adaptive trust profile endpoint
US10623431B2 (en) 2017-05-15 2020-04-14 Forcepoint Llc Discerning psychological state from correlated user behavior and contextual information
US10999297B2 (en) 2017-05-15 2021-05-04 Forcepoint, LLC Using expected behavior of an entity when prepopulating an adaptive trust profile
US10917423B2 (en) 2017-05-15 2021-02-09 Forcepoint, LLC Intelligently differentiating between different types of states and attributes when using an adaptive trust profile
US10447718B2 (en) 2017-05-15 2019-10-15 Forcepoint Llc User profile definition and management
US10318729B2 (en) 2017-07-26 2019-06-11 Forcepoint, LLC Privacy protection during insider threat monitoring
US10637846B2 (en) * 2017-08-30 2020-04-28 Capital One Services, Llc System and method for cloud-based analytics
CN107809329B (en) * 2017-10-24 2020-06-19 黄强 Method for realizing CPS model of information physical fusion system and model thereof
US10764270B2 (en) 2017-11-20 2020-09-01 Allstate Insurance Company Cryptographically transmitting and storing identity tokens and/or activity data among spatially distributed computing devices
US10839091B2 (en) 2017-12-05 2020-11-17 International Business Machines Corporation Protection of data privacy for cognitive demand forecasting
CN109995518A (en) * 2017-12-29 2019-07-09 北京京东尚科信息技术有限公司 Method for generating cipher code and device
US11539748B2 (en) 2018-01-23 2022-12-27 Zeronorth, Inc. Monitoring and reporting enterprise level cybersecurity remediation
US11121872B2 (en) * 2018-01-23 2021-09-14 Zeronorth, Inc. Trusted verification of cybersecurity remediation
CN108873733B (en) * 2018-06-07 2021-08-06 广州供电局有限公司 Analysis method for information expected accident influence in electric power information physical system
US10853496B2 (en) 2019-04-26 2020-12-01 Forcepoint, LLC Adaptive trust profile behavioral fingerprint
US11562057B2 (en) 2020-02-05 2023-01-24 Quantum Digital Solutions Corporation Ecosystem security platforms for enabling data exchange between members of a digital ecosystem using digital genomic data sets
CN112000940B (en) * 2020-09-11 2022-07-12 支付宝(杭州)信息技术有限公司 User identification method, device and equipment under privacy protection
JP2024507719A (en) 2021-02-04 2024-02-21 クアンタム デジタル ソリューションズ コーポレーション Ciphergenics-based ecosystem security platform
CN116318687B (en) * 2023-05-19 2023-09-22 广东广宇科技发展有限公司 Data dynamic encryption method based on bidirectional mapping matrix

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060105745A1 (en) * 2004-10-22 2006-05-18 Frank Edward H System and method for protecting data provided by a cellular telephone
US20090204457A1 (en) * 2007-11-01 2009-08-13 Buhrmann Michael F System and method for authenticating a user of multiple computer applications, networks or devices using a wireless device
US7634482B2 (en) * 2003-07-11 2009-12-15 Global Ids Inc. System and method for data integration using multi-dimensional, associative unique identifiers
US20100153156A1 (en) * 2004-12-13 2010-06-17 Guinta Lawrence R Critically/vulnerability/risk logic analysis methodology for business enterprise and cyber security

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6847948B1 (en) * 1999-12-20 2005-01-25 International Business Machines Corporation Method and apparatus for secure distribution of software/data
US7764308B2 (en) * 2002-05-27 2010-07-27 Nikon Corporation Image transmission system, image relay apparatus, and electronic image device
US7574600B2 (en) * 2004-03-24 2009-08-11 Intel Corporation System and method for combining user and platform authentication in negotiated channel security protocols
WO2012139127A1 (en) * 2011-04-08 2012-10-11 Wombat Security Technologies, Inc. Context-aware training systems, apparatuses, and methods
US9384490B2 (en) * 2012-01-18 2016-07-05 Cellco Partnership Cross channel real time awareness framework

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7634482B2 (en) * 2003-07-11 2009-12-15 Global Ids Inc. System and method for data integration using multi-dimensional, associative unique identifiers
US20060105745A1 (en) * 2004-10-22 2006-05-18 Frank Edward H System and method for protecting data provided by a cellular telephone
US20100153156A1 (en) * 2004-12-13 2010-06-17 Guinta Lawrence R Critically/vulnerability/risk logic analysis methodology for business enterprise and cyber security
US20090204457A1 (en) * 2007-11-01 2009-08-13 Buhrmann Michael F System and method for authenticating a user of multiple computer applications, networks or devices using a wireless device

Also Published As

Publication number Publication date
US20110302640A1 (en) 2011-12-08
US9635016B2 (en) 2017-04-25
US9253181B2 (en) 2016-02-02
US20160087969A1 (en) 2016-03-24
US8832808B2 (en) 2014-09-09

Similar Documents

Publication Publication Date Title
US9635016B2 (en) Cyber gene identification technology based on entity features in cyber space
Liang et al. Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems
Hamidi An approach to develop the smart health using Internet of Things and authentication based on biometric technology
Alqassem et al. A taxonomy of security and privacy requirements for the Internet of Things (IoT)
Sandhya et al. Securing fingerprint templates using fused structures
Joshi et al. Unified authentication and access control for future mobile communication-based lightweight IoT systems using blockchain
CN105207780B (en) A kind of certification user method and device
Barni et al. SEMBA: secure multi‐biometric authentication
Khowaja et al. A secure data sharing scheme in Community Segmented Vehicular Social Networks for 6G
A. Hassen et al. Towards a secure signature scheme based on multimodal biometric technology: application for IOT Blockchain network
Kumar et al. A new user identity based authentication, using security and distributed for cloud computing
CN107395369A (en) Towards mobile Internet from the authentication method of carrying device, access method and system
CN102594807A (en) Network gene recognition method based on entity self characteristics in information space
Diedhiou et al. An IoT mutual authentication scheme based on PUF and blockchain
CN114205816B (en) Electric power mobile internet of things information security architecture and application method thereof
Sugitha et al. Block chain fostered cycle‐consistent generative adversarial network framework espoused intrusion detection for protecting IoT network
Wang et al. Not yet another digital ID: privacy-preserving humanitarian aid distribution
Qu et al. Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence
Asadpour et al. Presenting a new method of authentication for the internet of things based on RFID
Conti et al. Biometric sensors rapid prototyping on field-programmable gate arrays
Raja et al. Towards better and unlinkable protected biometric templates using label‐assisted discrete hashing
Ruiu et al. Enhancing eID card mobile-based authentication through 3D facial reconstruction
CN112541764B (en) Asset management method, device and system based on intelligent contract
Sadhya et al. Generation of cancellable locality sampled codes from facial images
Wang et al. Credible identity authentication mechanism of electric Internet of Things based on blockchain

Legal Events

Date Code Title Description
ZAAA Notice of allowance and fees due

Free format text: ORIGINAL CODE: NOA

ZAAB Notice of allowance mailed

Free format text: ORIGINAL CODE: MN/=.

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: JIANGSU DIGITAL DNA TECHNOLOGY CO.,LTD, CHINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LIU, NANJIE;SUN, JUN;ZHAO, HAITAO;AND OTHERS;REEL/FRAME:038895/0962

Effective date: 20160613

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20240202